Across
- 3. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
- 5. An attack in which someone sends unsolicited messages to a Bluetooth-enabled device
- 6. gap, To physically separate or isolate a system from other systems or networks (2 words)
- 12. A computer connected to the Internet that has been compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
- 13. A technique allowing to locate a web user based on their IP address
- 14. Attackers searching for wireless networks with vulnerabilities while moving around an area in a moving vehicle
- 18. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
- 19. Software that compromises the operation of a system by performing an unauthorized function or process.
- 20. Engineering, The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes (2 words)
- 23. loss prevention, A set of procedures and mechanisms to stop sensitive data from leaving a security boundary (3 words)
- 25. Refers to anything that has the potential to cause serious harm to a computer system
- 28. a technique that is aimed to distract hackers with a fake target (a computer or data) and make them pursue it instead of the real one. It helps to secure a high-value target and observe hackers’ main techniques to learn from them
- 29. A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data.
- 30. Refers to everything in a web application that is displayed or takes place on the client (end user device)
- 31. king the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
- 32. Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
Down
- 1. The process of verifying the identity or other attributes of an entity (user, process, or device).
- 2. response, The activities that address the short-term, direct effects of an incident and may also support short-term recovery.
- 4. A malware designed to deny a user or organization access to files on their computer, without first paying a fee.
- 7. A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
- 8. , A network security system that filters unsanctioned incoming and outgoing traffic.
- 9. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
- 10. A type of malware that conceals its true content to fool a user into thinking it's a harmless file
- 11. A technique for identifying and dropping packets that have a false source address.
- 15. A technique to breach the security of a network or information system in violation of security policy.
- 16. A notification that a specific attack has been detected or directed at an organization’s information system
- 17. Refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (
- 21. An unauthorized user who attempts to or gains access to an information system.
- 22. the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
- 24. A tool that record what a person types on a device
- 26. The process of transforming plaintext into ciphertext.
- 27. a cybercrime in which the attacker floods a target with internet traffic to prevent users from accessing connected online services and sites (Acronym)